A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
Artificial-Noise-Aided Message Authentication Codes with Information-Theoretic Security
[article]
2015
arXiv
pre-print
In this paper, we propose a new cryptographic primitive, namely, artificial-noise-aided MACs (ANA-MACs), which can be considered as both computationally secure and information-theoretically secure. ...
In the past, two main approaches for the purpose of authentication, including information-theoretic authentication codes and complexity-theoretic message authentication codes (MACs), were almost independently ...
In this paper, we develop a new cryptographic primitive, artificial-noise-aided MACs (ANA-MACs) for ensuring information-theoretic security. ...
arXiv:1511.05357v1
fatcat:gwevms6hhfaevmy6fykv6sijfi
Artificial-Noise-Aided Message Authentication Codes With Information-Theoretic Security
2016
IEEE Transactions on Information Forensics and Security
In the past, two main approaches for the purpose of authentication, including information-theoretic authentication codes and complexity-theoretic message authentication codes (MACs), were almost independently ...
In this paper, we propose a new cryptographic primitive, namely, artificial-noiseaided MACs (ANA-MACs), which can be considered as both computationally secure and information-theoretically secure. ...
In this paper, we develop a new cryptographic primitive, artificial-noise-aided MACs (ANA-MACs) for ensuring information-theoretic security. ...
doi:10.1109/tifs.2016.2524514
fatcat:geyzs4whl5eibo33kii4oywj7i
An Overview of Physical Layer Security With Finite-Alphabet Signaling
2019
IEEE Communications Surveys and Tutorials
messages, cognitive multiple access and relay networks. ...
With this motivation, this article reviews recent developments on physical layer security with finite-alphabet inputs. ...
Artificial noise-aided transmit precoding strategies with the objective of maximizing the secrecy rate are proposed in [44] - [47] . ...
doi:10.1109/comst.2018.2880421
fatcat:y4kxllk6jrbhjoztuq4hxynzrm
Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey
2014
IEEE Communications Surveys and Tutorials
The survey begins with an overview of the foundations dating back to the pioneering work of Shannon and Wyner on information-theoretic security. ...
The associated problem of physical-layer message authentication is also introduced briefly. The survey concludes with observations on potential research directions in this area. ...
Thus, information-theoretic security is now commonly accepted as the strictest form of security. ...
doi:10.1109/surv.2014.012314.00178
fatcat:cmqxgwotmvbmldwqdvjkzsweam
Adaptive limited feedback for MISO wiretap channels with cooperative jamming
2013
2013 IEEE 14th Workshop on Signal Processing Advances in Wireless Communications (SPAWC)
The survey begins with an overview of the foundations dating back to the pioneering work of Shannon and Wyner on information-theoretic security. ...
The associated problem of physical layer message authentication is also briefly introduced. The survey concludes with observations on potential research directions in this area. ...
Thus, information-theoretic security is now commonly accepted as the strictest form of security. ...
doi:10.1109/spawc.2013.6612057
dblp:conf/spawc/PeiMW13
fatcat:gjn4o2l4qjae5ipsr6zfjo35yu
An Overview of Physical Layer Security with Finite-Alphabet Signaling
[article]
2018
arXiv
pre-print
messages, cognitive multiple access and relay networks. ...
With this motivation, this article reviews recent developments on physical layer security with finite-alphabet inputs. ...
Artificial noise-aided transmit precoding strategies with the objective of maximizing the secrecy rate are proposed in [44] - [47] . ...
arXiv:1802.06401v2
fatcat:ribkfxbb7bgklf4zvqp2llhayy
A Survey on Wireless Security: Technical Challenges, Recent Advances, and Future Trends
2016
Proceedings of the IEEE
Additionally, we discuss the integration of physical-layer security into existing authentication and cryptography mechanisms for further securing wireless networks. ...
We first summarize the security requirements of wireless networks, including their authenticity, confidentiality, integrity and availability issues. ...
Third, we discuss the emerging physical-layer security in wireless communications and highlight the class of information-theoretic security, artificial-noise-aided security, security-oriented beamforming ...
doi:10.1109/jproc.2016.2558521
fatcat:yttlvv4vlne5hh5l4zs6qlh2ra
Authentication of Satellite Navigation Signals by Wiretap Coding and Artificial Noise
[article]
2018
arXiv
pre-print
In order to combat the spoofing of global navigation satellite system (GNSS) signals we propose a novel approach for satellite signal authentication based on information-theoretic security. ...
In particular we superimpose to the navigation signal an authentication signal containing a secret message corrupted by artificial noise (AN), still transmitted by the satellite. ...
An artificial noise (AN) aided message authentication code is proposed where the AN is quantized and transmitted above the physical layer. ...
arXiv:1802.04513v2
fatcat:ym47w6tzsnee3dv3rh5ws47xvq
Enhancing Information Security via Physical Layer Approaches in Heterogeneous IoT with Multiple Access Mobile Edge Computing in Smart City
2019
IEEE Access
Specifically, we investigate the secure wiretap coding, resource allocation, signal processing, and multi-node cooperation, along with physical layer key generation and authentication, to cope with the ...
Finally, the paper is concluded with some possible future research directions. ...
Here, the code rate is split into the rate R s of actual secret messages and the rate R e of protection messages with no information content. ...
doi:10.1109/access.2019.2913438
fatcat:bk2b4tiy4jf5pmrmtpu72w5x7a
Physical Layer Security: Authentication, Integrity and Confidentiality
[article]
2020
arXiv
pre-print
In this survey, we review the aforementioned fundamental aspects of PLS, starting with node authentication, moving to the information theoretic characterization of message integrity, and finally, discussing ...
Unlike the corresponding classical cryptographic approaches which are all based on computational security, PLS's added strength is that it is based on information theoretic security, in which no limitation ...
The information theoretic limits of the message authentication problem was first considered by Simmons [29] . ...
arXiv:2001.07153v1
fatcat:m6pxtxwl7bbfpf4wiz5hvlnxnq
A Review of Physical Layer Security Techniques for Internet of Things: Challenges and Solutions
2018
Entropy
Among the communication security provisioning techniques, physical layer security (PLS), which can provide unbreakable, provable, and quantifiable secrecy from an information-theoretical point of view, ...
Communication security is critically important for the operations of IoT. ...
and use the key as a one-time pad to ensure information-theoretic security. ...
doi:10.3390/e20100730
pmid:33265819
pmcid:PMC7512293
fatcat:fd43pygkejdflckeeijhiwfrl4
Safeguarding MTC at the Physical Layer: Potentials and Challenges
2020
IEEE Access
Key issues are discussed along with potential solutions. ...
However, as the definition and implementation of 5G networks are in progress, many security challenges arise. ...
Therefore, a data-aided secure downlink transmission scheme was proposed, which achieves significant secrecy rate gains compared with alternative approaches based on matched filter precoding with artificial ...
doi:10.1109/access.2020.2996383
fatcat:espxiyuqnfgcvgw2yxy4p24vxy
Security and Privacy vulnerabilities of 5G/6G and WiFi 6: Survey and Research Directions from a Coexistence Perspective
[article]
2022
arXiv
pre-print
We study potential vulnerabilities in the perspective of physical layer authentication, network access security, and cross-layer authentication mechanisms. ...
Hence, all accesses to the network shall be authenticated and authorized within the intra-network security system and is deemed illegal otherwise. ...
Using artificial noise (AN) with imperfect knowledge of CSI is studied in [70] for hiding a Hash-based message authentication code (HMAC). ...
arXiv:2206.14997v1
fatcat:iew3uclwufcxpfi77i3sv4zuje
A Survey on Cooperative Jamming Applied to Physical Layer Security
2015
2015 IEEE International Conference on Ubiquitous Wireless Broadband (ICUWB)
Index Terms-Physical layer security, cooperative jamming, beamforming, power allocation, artificial noise, multiple antennas, MIMO, game theory. ...
Security has always played a critical role in wireless cooperative communication systems design. Eavesdropping and jamming are two common threats to the information security in wireless networks. ...
coding and network coding), power allocation, and signal design (artificial noise). ...
doi:10.1109/icuwb.2015.7324413
dblp:conf/icuwb/AtallahKK15
fatcat:x6vyqvd4zjfxzfyzzyvbmscb4q
What Physical Layer Security Can Do for 6G Security
[article]
2022
arXiv
pre-print
While existing security protocols were designed with a focus on the core network, the enhancement of the security of the B5G access network becomes of critical importance. ...
Despite the strengthening of 5G security protocols with respect to LTE, there are still open issues that have not been fully addressed. ...
In particular, 1 PLS can provide information-theoretic security guarantees with lightweight mechanisms (e.g., using LDPC, Polar codes, etc.); 2 Hybrid crypto-PLS protocols can provide fast, lowfootprint ...
arXiv:2212.00427v1
fatcat:dvfrjqa7gvda3hqxvf6g6emf24
« Previous
Showing results 1 — 15 out of 5,684 results